Release Notes for BIND Version 9.10.4-P4

Introduction

BIND 9.10.4-P4 addresses the security issue described in
CVE-2016-8864.

BIND 9.10.4-P3 addresses the security issue described in
CVE-2016-2776 and addresses an interoperability issue with
ECS clients.

BIND 9.10.4-P2 addresses the security issue described in
CVE-2016-2775.

BIND 9.10.4-P1 addresses Windows installation issues, the %z
modifier is not supported under Windows and a race condition
in the rbt/rbtdb implementation resulting in named exiting
due to assertion failures being detected.

Download

The latest versions of BIND 9 software can always be found at
http://www.isc.org/downloads/.
There you will find additional information about each release,
source code, and pre-compiled versions for Microsoft Windows
operating systems.

Security Fixes

It was possible to trigger assertions when processing
a response. This flaw is disclosed in CVE-2016-8864. [RT #43465]

It was possible to trigger a assertion when rendering a
message using a specially crafted request. This flaw is
disclosed in CVE-2016-2776. [RT #43139]

getrrsetbyname with a non absolute name could trigger an
infinite recursion bug in lwresd and named with lwres
configured if when combined with a search list entry the
resulting name is too long. This flaw is disclosed in
CVE-2016-2775. [RT #42694]

New Features

None.

Feature Changes

None.

Porting Changes

None.

Bug Fixes

ECS clients with the option set to 0.0.0.0/0/0 or ::/0/0
where incorrectly getting a FORMERR response.

Windows installs were failing due to triggering UAC without
the installation binary being signed.

A race condition in rbt/rbtdb was leading to INSISTs being
triggered.

End of Life

Thank You

Thank you to everyone who assisted us in making this release possible.
If you would like to contribute to ISC to assist us in continuing to
make quality open source software, please visit our donations page at
http://www.isc.org/donate/.